Skip navigation

Effective October 28, 2019 Duo Security will be transitioning to Cisco's Privacy Statement. View the Duo Privacy Data Sheet.


Close Security Gaps

When your users’ devices are out of date, they’re more susceptible to exploits that leverage known flaws in software - and when they log into your applications, that means your data is also at risk.

Duo’s Self-Remediation lets your admins notify and warn your users of out-of-date software at login, enabling them to update their own devices immediately with a direct link to update.

Warn users they’ll be denied access in a certain number of days unless they update. Or, use Duo’s Endpoint Remediation to automatically block device access to enterprise applications based on outdated software versions.

Security Starts With Transparency

To give you actionable data, Duo’s Device Insight collects information about your users’ devices as they authenticate into your applications so you can see how many devices are out of date or jailbroken, rooted, encrypted and more. All without using a device agent.

Healthy Devices

Endpoint Remediation is one way we check the security health of every device before they log into your applications; blocking risky devices to prevent the spread of malware and a potential data breach.

Trusted Access

Duo's Trusted Access ensures only Trusted Users and Trusted Devices can access protected applications.

This complete security solution prevents modern attackers that often target multiple areas - including credential theft and the exploitation of known software vulnerabilities affecting outdated software versions.

  • “Duo has solved the issue of enforcing security on devices and services that have no user enforceable password policies with an easy to use, user-friendly service that integrates into nearly all devices.”

    — Brad Boegler, System Administrator, Nexcess
  • “Duo Security has helped us apply strong authentication in a risk-based way, which allows us to maximize user productivity while breaking the kill-chain commonly leveraged by advanced threats (ie. lateral movement).”

    — Anonymous, Security Officer, Medium Enterprise Telecommunications Services Company
Cover of The Essential Guide to Securing Remote Access eBook

The Essential Guide to Securing Remote Access

Ensuring User, Device and App Trust

Ideal for professionals concerned with information security, this guide is for any organization that allows remote access to their environment.